Using Hypergraph to Design Perfect Secret Sharing Schemes for General Access Structures
碩士 === 國立暨南國際大學 === 資訊工程學系 === 95 === A secret sharing scheme is a method to distribute a secret, also called master key, among a set of participants, such that only qualified subsets of the participants can recover the secret. A secret sharing scheme is perfect if any unqualified subset obtains no...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2007
|
Online Access: | http://ndltd.ncl.edu.tw/handle/82627995009795757195 |
id |
ndltd-TW-095NCNU0392012 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-095NCNU03920122016-05-23T04:17:31Z http://ndltd.ncl.edu.tw/handle/82627995009795757195 Using Hypergraph to Design Perfect Secret Sharing Schemes for General Access Structures 利用超圖所設計之對於一般授權者集合的完美機密配置系統 Yi-Chun 王怡君 碩士 國立暨南國際大學 資訊工程學系 95 A secret sharing scheme is a method to distribute a secret, also called master key, among a set of participants, such that only qualified subsets of the participants can recover the secret. A secret sharing scheme is perfect if any unqualified subset obtains no information regarding the master key. The collection of qualified subsets is called the access structure. In a hypergraph, if the size of any edge is equal to $r$, the hypergraph is called an $r$-uniform hypergraph. Similarity, if the size of any edge is equal to either $r_1$ or $r_2$ in a hypergraph, the hypergraph is called an ($r_1, r_2$)-uniform hypergraph. And, if the possible size of any edge is $r_1, r_2$ or $r_3$ in a hypergraph, the hypergraph is called an ($r_1, r_2, r_3$)-uniform hypergraph. Given any hypergraph $G$, a $G$-based access structure is an access structure which using $G$ present the access structure, where a vertex denote a participant and the edge set denote the minimal access structure of a secret sharing scheme. In this thesis, we propose four perfect secret sharing schemes for $r$-uniform, ($r_1, r_2$)-uniform, ($r_1, r_2, r_3$)-uniform and general hypergraph-based access structures (called $r$-HA, ($r_1, r_2$)-HA, ($r_1, r_2, r_3$)-HA and G-HA scheme respectively). Moreover, we modify G-HA scheme such that it: 1. can verify the shares (verification) and detect the cheater (detection), 2. can be reused, that is, will be multi-use secret sharing scheme, and 3. will be a multi-use secret sharing scheme with verification and detection. At last, this thesis shows that $r$-HA, ($r_1, r_2$)-HA, ($r_1, r_2, r_3$)-HA and G-HA schemes are all more efficient secret sharing scheme than the scheme be hold by Tochikubo, Uyematsu and Matsumoto in 2005 for the respective same access structure. Justie Su-Tzu Juan 阮夙姿 2007 學位論文 ; thesis 45 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立暨南國際大學 === 資訊工程學系 === 95 === A secret sharing scheme is a method to distribute a secret, also called master key, among a set of participants, such that only qualified subsets of the participants can recover the secret. A secret sharing scheme is perfect if any unqualified subset obtains no information regarding the master key. The collection of qualified subsets is called the access structure.
In a hypergraph, if the size of any edge is equal to $r$, the hypergraph is called an $r$-uniform hypergraph. Similarity, if the size of any edge is equal to either $r_1$ or $r_2$ in a hypergraph, the hypergraph is called an ($r_1, r_2$)-uniform hypergraph. And, if the possible size of any edge is $r_1, r_2$ or $r_3$ in a hypergraph,
the hypergraph is called an ($r_1, r_2, r_3$)-uniform hypergraph. Given any hypergraph $G$, a $G$-based access structure is an access structure which using $G$ present the access structure, where a vertex denote a participant and the edge set denote the minimal access structure of a secret sharing scheme.
In this thesis, we propose four perfect secret sharing schemes for $r$-uniform, ($r_1, r_2$)-uniform, ($r_1, r_2, r_3$)-uniform and general hypergraph-based access structures (called $r$-HA, ($r_1, r_2$)-HA, ($r_1, r_2, r_3$)-HA and G-HA scheme respectively). Moreover, we modify G-HA scheme such that it: 1. can verify the shares (verification) and detect the cheater (detection),
2. can be reused, that is, will be multi-use secret sharing scheme, and 3. will be a multi-use secret sharing scheme with verification and detection.
At last, this thesis shows that $r$-HA, ($r_1, r_2$)-HA, ($r_1, r_2, r_3$)-HA and G-HA schemes are all more efficient secret sharing scheme than the scheme be hold by Tochikubo, Uyematsu and Matsumoto in 2005 for the respective same access structure.
|
author2 |
Justie Su-Tzu Juan |
author_facet |
Justie Su-Tzu Juan Yi-Chun 王怡君 |
author |
Yi-Chun 王怡君 |
spellingShingle |
Yi-Chun 王怡君 Using Hypergraph to Design Perfect Secret Sharing Schemes for General Access Structures |
author_sort |
Yi-Chun |
title |
Using Hypergraph to Design Perfect Secret Sharing Schemes for General Access Structures |
title_short |
Using Hypergraph to Design Perfect Secret Sharing Schemes for General Access Structures |
title_full |
Using Hypergraph to Design Perfect Secret Sharing Schemes for General Access Structures |
title_fullStr |
Using Hypergraph to Design Perfect Secret Sharing Schemes for General Access Structures |
title_full_unstemmed |
Using Hypergraph to Design Perfect Secret Sharing Schemes for General Access Structures |
title_sort |
using hypergraph to design perfect secret sharing schemes for general access structures |
publishDate |
2007 |
url |
http://ndltd.ncl.edu.tw/handle/82627995009795757195 |
work_keys_str_mv |
AT yichun usinghypergraphtodesignperfectsecretsharingschemesforgeneralaccessstructures AT wángyíjūn usinghypergraphtodesignperfectsecretsharingschemesforgeneralaccessstructures AT yichun lìyòngchāotúsuǒshèjìzhīduìyúyībānshòuquánzhějíhédewánměijīmìpèizhìxìtǒng AT wángyíjūn lìyòngchāotúsuǒshèjìzhīduìyúyībānshòuquánzhějíhédewánměijīmìpèizhìxìtǒng |
_version_ |
1718277695598493696 |